[LTP] [PATCH v2 1/1] fanotify14: fix anonymous pipe testcases

Mete Durlu meted@linux.ibm.com
Thu Mar 14 09:34:59 CET 2024


On 3/13/24 08:26, Petr Vorel wrote:

Hi,

thanks for the review. I can send a v3 with the suggested changes if
that will make things easier. Just let me know.

>>>          if (tc->pfd) {
>>>                  dirfd = tc->pfd[0];
>>>                  path = NULL;
>>> +               se_enforcing = is_selinux_enforcing();
> nit: this check should be in the setup function to be done only once.
> (by default it's done twice, because we have 2 testcases with pfd, we support
> -iN parameter, thus it's actually 2*N.). I'll fix it before merge.
>>>          }
>
Nice catch! I fully forgot that there was a setup function while I
was trying to find the best TST_ macro to use.

>>>          tst_res(TINFO, "Testing %s with %s",
>>>                  tc->mark.desc, tc->mask.desc);
>>> -       TST_EXP_FD_OR_FAIL(fanotify_mark(fanotify_fd, FAN_MARK_ADD | tc->mark.flags,
>>> -                                        tc->mask.flags, dirfd, path),
>>> -                                        tc->expected_errno);
>>> +
>>> +       if (tc->pfd && se_enforcing) {
>>> +               const int exp_errs[] = {tc->expected_errno, EACCES};
>>> +
>>> +               TST_EXP_FAIL_ARR(fanotify_mark(fanotify_fd, FAN_MARK_ADD | tc->mark.flags,
>>> +                                tc->mask.flags, dirfd, path),
>>> +                                exp_errs);
>>> +       } else {
>>> +               TST_EXP_FAIL(fanotify_mark(fanotify_fd, FAN_MARK_ADD | tc->mark.flags,
>>> +                                                tc->mask.flags, dirfd, path),
>>> +                                                tc->expected_errno);
>>> +       }
> 
> 
>> This looks fine to me, but on second thought I am not sure how important
>> it is to special case se_enforcing.
>> We could probably always check for either error value.
> 
> I don't mind explicitly testing EACCES with SELinux. @Jan WDYT?
> 
> With a diff below (I can change it before merge + I would do the following work
> to integrate this into the LTP C API):
> Reviewed-by: Petr Vorel <pvorel@suse.cz>
> 
> Kind regards,
> Petr
> 
> diff --git testcases/kernel/syscalls/fanotify/fanotify14.c testcases/kernel/syscalls/fanotify/fanotify14.c
> index 52c327dff..89d59c8b2 100644
> --- testcases/kernel/syscalls/fanotify/fanotify14.c
> +++ testcases/kernel/syscalls/fanotify/fanotify14.c
> @@ -49,6 +49,7 @@ static int pipes[2] = {-1, -1};
>   static int fanotify_fd;
>   static int ignore_mark_unsupported;
>   static int filesystem_mark_unsupported;
> +static int se_enforcing;
>   static unsigned int supported_init_flags;
>   
>   struct test_case_flags_t {
> @@ -290,12 +291,10 @@ static void do_test(unsigned int number)
>   	/* Set mark on non-dir only when expecting error ENOTDIR */
>   	const char *path = tc->expected_errno == ENOTDIR ? FILE1 : MNTPOINT;
>   	int dirfd = AT_FDCWD;
> -	int se_enforcing = 0;
>   
>   	if (tc->pfd) {
>   		dirfd = tc->pfd[0];
>   		path = NULL;
> -		se_enforcing = is_selinux_enforcing();
>   	}
>   
>   	tst_res(TINFO, "Testing %s with %s",
> @@ -360,6 +359,8 @@ static void do_setup(void)
>   	SAFE_FILE_PRINTF(FILE1, "0");
>   	/* Create anonymous pipes to place marks on */
>   	SAFE_PIPE2(pipes, O_CLOEXEC);
> +
> +	se_enforcing = is_selinux_enforcing();
>   }
>   
>   static void do_cleanup(void)
>> Let's see what Jan and Petr think.
> 
>> Thanks,
>> Amir.



More information about the ltp mailing list